Known malware will still be detected, even if you ignore the
troublesome PUA sigs.

These aren't really false positives since the .pdf really does
contain javascript.  So the sigs are working as intended.

The alternative is to communicate to your users that .pdf files
containing javascript are not allowed in email.  Unfortunately,
*many* legit .pdf files contain javascript.

This is more of a local policy decision than a tech decision.


  -- Noel Jones



On 3/31/2016 9:25 AM, polloxx wrote:
> That's known to me Steve.
> I'm afraid malware will not be detected in that case.
> 
> P.
> 
> On Thu, Mar 31, 2016 at 3:43 PM, Steve Basford <
> steveb_cla...@sanesecurity.com> wrote:
> 
>>
>> On Thu, March 31, 2016 2:33 pm, polloxx wrote:
>>> Since the new Clamav database we have a lot more false positives for
>>> PUA.Pdf.Trojan.EmbeddedJS-1 and PUA.Win.Trojan.EmbeddedPDF-1.
>>> What can we do about this, except disabling PUA?
>>
>> Create a local.ign2 with the following lines:
>>
>> PUA.Pdf.Trojan.EmbeddedJS-1
>> PUA.Win.Trojan.EmbeddedPDF-1
>>
>> Place in ClamAV database folder and restart clamd
>>
>> Cheers,
>>
>> Steve
>> Web : sanesecurity.com
>> Blog: sanesecurity.blogspot.com
>> Twitter: @sanesecurity
>>
>> _______________________________________________
>> Help us build a comprehensive ClamAV guide:
>> https://github.com/vrtadmin/clamav-faq
>>
>> http://www.clamav.net/contact.html#ml
>>
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
> 
> http://www.clamav.net/contact.html#ml
> 

_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to